SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does DISM /Get-Drivers do?
Perform an offline migration
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
Used to get a list of installed 3rd party drivers
To display friendly labels to capture packet address headers.
2. Where should you backup to automate System Image backups and maintain multiple images?
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
System Restore Points as well as Previous Versions of Files (configured through the System applet).
A network location.
By running the Update Status summary report.
3. How do you view failed WSUS updates on the WSUS server?
Use the BCDEDIT.EXE command
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
By running the Update Status summary report.
4. What does the PSCONSOLEFILE option in POWERSHELL do?
Create a customized shell
Windows PE and Windows.old.
Windows 7 Ultimate.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
5. Why would you deploy an application compatibility database across multiple computers?
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
6. What is EAP?
Extensive Authentication Protocol used in PPP authentication.
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
Uncheck IPV6 from the network properties.
They can place quotas on folders/volumes - activity screen files - and generate comprehensive storage reports. This assists in not only monitoring existing resource but helping on future planning.
7. How many bits are in the site subnet?
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
Delegate permission by configuring the dacl of the zone file.
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Windows 7 Ultimate.
8. What do you do if you install an older operating AFTER you install Windows 7?
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
9. How can you removed a stale resource record from DNS?
DHCPv6 obtains additional configuration settigns.
Enforce IPSEC on the network
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
Configure aging and scavenging.
10. What is InPrivate Browsing?
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
Which processes currently consume a resource like processor utilization.
System Restore Points as well as Previous Versions of Files (configured through the System applet).
11. What is the command line version of windows server backup?
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
Conditional forward
wbadmin.exe. This can backup critical files.
12. How do you upgrade windows vista to windows 7?
IPV6 transition technologies
DHCPv6 obtains additional configuration settigns.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
WIndows Update Server
13. How do you ping the IPV6 address of a remote computer?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. What is the command to add a DNS server?
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
Use IPCONFIG or Status Details for the Network Connection.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Use the Advanced Firewall to define Connection Security Rules.
15. What is Internet Explorer Content Advisor?
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
No
Backups of the full system including all critical volumes (volumes that contain operating system state).
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
16. How do you enable a recovery agent?
Setup a GlobalNames zone.
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
Using wecutil -cs in an xml file.
Configure the enforcement points as RADIUS clients.
17. What is the command to configure the preferred DNS server?
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Configure a GPO to modify the computers location to look for updates.
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
18. How do you view failed WSUS updates on the client PC?
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
IN the WindowsUpdateClient log in the system log portion of event viewer.
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
19. How do you repartition your hard disk by using the Shrink feature in Disk Management?
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
Windows PE and Windows.old.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
20. What does dnscmd /zoneadd primary do?
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
Adds a file based zone
Yes
21. What does it mean to Extend a Basic Disk Volume?
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Only sites added to the local Intranet Zones
A network location.
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
22. What do wireless access points need in order for NAP to enforce wireless access policy (WAP)?
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
They need to be configured us use 802.1x RADIUS authentication
Windows XP and Server 2003.
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
23. Can DISM can apply an answer file to an offline image?
It will display driver signing status
Deploy a secondary zone.
Yes
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
24. What is the difference between MSCHAP2 and EAP-TLS?
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Can be used to create virtual hard disks
A file that is loaded when a DNS server starts up and populate the root hints.
25. What must you do if you have a static ip address assigned?
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
Use the Advanced Firewall to define Connection Security Rules.
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
26. What does running network monitor in PMode do?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
27. What does WINRM QUICKCONFIG do?
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Configure a GPO to modify the computers location to look for updates.
The latest Vista Service Pack
28. Why would you add additional drivers for the various operating systems in your organization that will be connecting to the shared printer when sharing a printer?
IPSEC
To will ensure the clients download the appropriate printer driver.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
an email address where the @ is replaced with a period.
29. What is DiskPart?
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
The ICMP protocol.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
30. What should you modify of the NAP Agent client service if the computer needs to prove health status?
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
WECUTIL QC
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Delete all the zone files or reinstall the DNS service.
31. How do you create a subscription?
Using wecutil -cs in an xml file.
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
dynamic drives
It is the max size is expressed in megabytes.
32. Windows 9x ___________ an automatic update client.
Does not have
Add an AD integrated zone
Use dnscmd /zonerefresh.
It can add a driver to an offline WIM image with the /Add-Driver option
33. What requirements must your system must meet to use BranchCache?
A network location.
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
WPA-Enterprise (radius authentication)
It is the max size is expressed in megabytes.
34. How do you test the ip connectivity on IPV6?
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
It can enable a windows feature on an offline image with the /Enable-Feature option
Ping the Link Local Address (FE80 Address)
35. How can you secure file transfers across a network?
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
EAP protocol.
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
IN the WindowsUpdateClient log in the system log portion of event viewer.
36. What protocol does NAP enforce when used in 802.1x authentication?
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
EAP protocol.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
37. What does windows cardspace do?
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
WPA-Enterprise (radius authentication)
It backs up digitally identities to a password protected file.
38. How do you enable rdp on a core server?
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
Yes
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
39. What version does Windows XP must have to be able to connect with Remote Desktop to a computer requiring network level authentication?
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
Ping the Link Local Address (FE80 Address)
SP3
40. How do you can disable programs from autostarting?
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
Ping the Link Local Address (FE80 Address)
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
41. What does Parental Controls do?
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
Restrict when a child can logon to a computer.
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
Computer certificates be installed on client computers
42. How do you export the DNS zone to a text file?
By using the dnscmd /zoneexport command.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
Can be used to create virtual hard disks
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
43. What are a few types of NAP enforcement points?
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Use IPV6 Unique Local Addresses.
44. How do you restore individual files?
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Either from wbadmin or windows server backup.
4 (bits 53 - 56) /56 Allows for 16 regions
45. What are the minimum hardware requirements for Windows 7?
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
Enforce IPSEC on the network
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
Sent across the network
46. What do quota templates do?
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Windows XP and Server 2003.
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
Use SYNC Center
47. The WSUS server and remote SQL server _____________.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
Cannot be in different domains
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
48. Why would a secondary DNS server stop responding to client queries?
Only a local administrator
3389
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
Set IE back to its default settings
49. How can you modify event viewer from being filled up with the printer related events?
WIndows Update Server
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Turn off the Log Spooler event on a print server.
50. What does Windows ReadyBoost do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183